it organizations

Results 26 - 50 of 3022Sort Results By: Published Date | Title | Company Name
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
     Lookout
By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : black duck software, open source, platform, sap, multi-source, code, source
     Black Duck Software
By: Cisco and NVIDIA Corporation     Published Date: Jan 09, 2019
Migrating to Windows 10 is inevitable for keeping pace with modern demands. Cisco Unified Computing System (Cisco UCS®) and Cisco HyperFlex™ systems with NVIDIA GRID™ helps you seamlessly transition and make the most of thisnew operating system resulting in happier, more productive users.Cisco UCS and HyperFlex with NVIDIA GRID enablesorganizations to capitalize on all Windows 10 has to offer, breaking down the barriers to the ideal digital workplace.
Tags : 
     Cisco and NVIDIA Corporation
By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
     Great Bay Software
By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
     Great Bay Software
By: Forcepoint     Published Date: Jan 03, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw, next generation firewall, forcepoint, distributed offices, distributed network, firewall, swg, cloud web protection, cloud migration, cloud applications
     Forcepoint
By: Forcepoint     Published Date: Jan 03, 2019
Forcepoint Stratgies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn more!
Tags : network security, distributed offices, web security, branch security, digital transformation, data security, cyber security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
Forcepoint Stratgies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn more!
Tags : network security, distributed offices, web security, branch security, digital transformation, data security, cyber security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw, next generation firewall, forcepoint, distributed offices, distributed network, firewall, swg, cloud web protection, cloud migration, cloud applications
     Forcepoint
By: BMC ASEAN     Published Date: Dec 18, 2018
The world runs on IT operations. When new digital experiences delight customers, innovative business models disrupt industries, and big data makes organizations smarter than ever, it’s because of your success in supporting the complex, dynamic infrastructure and apps that power them.
Tags : 
     BMC ASEAN
By: BMC ASEAN     Published Date: Dec 18, 2018
The business world is entering an age of the digital “haves” and the digital “have-nots.” In fact, research firm Forrester anticipates a growing “digital crisis” in its 2018 predictions, noting that 60% of CIOs and other executives it surveyed say they’re behind in their digital transformations. Meanwhile, Forrester expects one in five CEOs will fail to act on digital initiatives and put their firms in serious jeopardy as a result. Savvy organizations are embracing cloud, the Internet of Things (IoT), artificial intelligence (AI), and other transformative technologies to solve meaningful business problems and achieve their strategic priorities. Everyone else is getting left behind. Nowhere is this fork-in-the-road moment more apparent than in how enterprise IT teams deliver and manage services, to employees and customers alike.
Tags : 
     BMC ASEAN
By: Infosys     Published Date: Dec 03, 2018
Data is a truly inexhaustible resource for an organization. It creates endless possibilities to make data do more. As a technology partner of hundreds of organizations around the world, Infosys helps clients navigate the journey from their current state to the next. Facilitating clients’ transition into data-native enterprises is a crucial part. To understand how companies are using data analytics today and their expectations in a world of endless possibilities with data, we recently commissioned an independent survey of 1,062 senior executives from organizations with annual revenues exceeding US$ 1 billion, in the United States, Europe, Australia, and New Zealand. The respondents were from business and technology roles, who were decision makers, program managers and external consultants; represented 12 industries, grouped into seven industry clusters, such as, consumer goods, retail and logistics, energy and utilities, financial services and insurance, healthcare and life sciences, h
Tags : 
     Infosys
By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
     Veeam '18
By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
     Okta APAC
By: NetApp     Published Date: Dec 13, 2013
Interested in running a Hadoop proof of concept on enterprise-class storage? Download this solutions guide to get a technical overview on building Hadoop on NetApp E-series storage. NetApp Open Solution for Hadoop delivers big analytics with preengineered, compatible, and supported solutions based on high-quality storage platforms so you reduce the cost, schedule, and risk of do-it-yourself systems and relieving the skills gap most organizations have with Hadoop. See how on going operational and maintenance costs can be reduced with a high available and scalable Hadoop solution.
Tags : open solutions, hadoop solutions guide
     NetApp
By: NetApp     Published Date: Dec 13, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson, as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : big data problems, how to get the most from your big data
     NetApp
By: MuleSoft     Published Date: Nov 27, 2018
IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: The bank’s legacy modernization strategy, and how they used Anypoint Platform Best practices for modernizing legacy SOA web services How to think about re-architecting monolithic applications into microservices The role that APIs play in driving an effective legacy modernization strategy
Tags : 
     MuleSoft
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Aug 09, 2008
ITIL provides a framework of customizable best practice initiatives that help organizations consistently deliver high-quality IT services. Effective ITIL implementation adds value to the IT infrastructure and improves business and service delivery.
Tags : asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
     ASG Software Solutions
By: Sitecore     Published Date: Nov 04, 2009
This report highlights the strategic value of a next generation web content management system integrated with lead scoring, email marketing, customer relationship management, and web analytics. The report links the technology and practices of Best-in-Class organizations to engage customers, provide personalized experiences and manage the lead lifecycle.
Tags : sitecore, aberdeen, lifecycle management, web content management, analytics, crm, emarketing, email marketing, lead generation
     Sitecore
By: Epson     Published Date: Jan 10, 2019
Since the earliest days of the industry, insurance companies have faced a never-ending struggle: processing the voluminous amount of paperwork that underwriting, claims, and compliance require. But the days of enduring the burdens caused by mountains of paper can become a distant memory. By investing in new, proven methods of converting paper documents to readable digital formats, insurance organizations can fully automate document processing to accelerate workflows, minimize processing times and enable more efficient operations.
Tags : 
     Epson
By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : mimecast, saas, email archiving, esg
     Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com